Sciweavers

1353 search results - page 47 / 271
» Securing Current and Future Process Control Systems
Sort
View
121
Voted
COMCOM
2002
143views more  COMCOM 2002»
15 years 2 months ago
Security architecture testing using IDS - a case study
Many security approaches are currently used in organisations. In spite of the widespread use of these security techniques, network intrusion remains a problem. This paper discusse...
Theuns Verwoerd, Ray Hunt
137
Voted
CSREAPSC
2006
15 years 4 months ago
Ubiquitous Security: Privacy versus Protection
- In the ambient computing future, security promises to be the foundational design feature that allows pervasive systems to protect personal information privacy. As fledgling perva...
Timothy Buennemeyer, Randolph Marchany, Joseph G. ...
121
Voted
ICRA
2009
IEEE
166views Robotics» more  ICRA 2009»
15 years 9 months ago
Anatomically correct testbed hand control: Muscle and joint control strategies
— Human hands are capable of many dexterous grasping and manipulation tasks. To understand human levels of dexterity and to achieve it with robotic hands, we constructed an anato...
Ashish Deshpande, Jonathan Ko, Dieter Fox, Yoky Ma...
112
Voted
SOSP
2005
ACM
15 years 11 months ago
The taser intrusion recovery system
Recovery from intrusions is typically a very time-consuming operation in current systems. At a time when the cost of human resources dominates the cost of computing resources, we ...
Ashvin Goel, Kenneth Po, Kamran Farhadi, Zheng Li,...
DEXAW
1999
IEEE
129views Database» more  DEXAW 1999»
15 years 7 months ago
Stakeholder Identification in the Requirements Engineering Process
Adequate, timely and effective consultation of relevant stakeholders is of paramount importance in the requirements engineering process. However, the thorny issue of making sure t...
Helen Sharp, Anthony Finkelstein, Galal Galal